JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
News
SiteMap
Login
Pages
.English
-
.Español
-
.tiếng Việt
-
.По-русски
-
.한국어
-
.日本語
-
.简体中文版
-
Academics
-
-
Tools
-
-
-
Tool Downloads (Pg. 1)
-
-
-
Tool Downloads (Pg. 2)
-
-
-
Tool Downloads (Pg. 3)
-
-
-
Tool Downloads (Pg. 4)
-
Curriculum
-
-
CNSS Standards
-
-
Ethics and Law
-
-
K-12 Material
-
-
NSA Centers of Excellence
-
-
Teaching Materials
-
-
-
4012 Presentation
-
-
-
Course Modules
-
-
-
-
Module 1
-
-
-
-
-
01. (I) Corporate Resource
-
-
-
-
-
02. (II) Basic Problems
-
-
-
-
-
03. (III) Ethical Issues
-
-
-
-
-
04. (IV) Studies
-
-
-
-
-
Teaching Considerations
-
-
-
-
Module 2
-
-
-
-
-
01. (I) Ethics
-
-
-
-
-
02. (II) Environment
-
-
-
-
-
03. (III) Physical
-
-
-
-
-
04. (IV) Data
-
-
-
-
-
05. (V) Security Training
-
-
-
-
-
Teaching Considerations
-
-
-
-
Module 3
-
-
-
-
-
01. (I) Planning
-
-
-
-
-
02. (II) Organizational Policies & Procedures
-
-
-
-
-
03. (III) Ethics and Professionalism
-
-
-
-
-
04. (IV) Personnel Security
-
-
-
-
-
05. (V) Physical Security
-
-
-
-
-
06. (VI) System Security
-
-
-
-
-
07. (VII) Threats & Vulnerabilities
-
-
-
-
-
08. (VIII) Data Security & Recovery
-
-
-
-
-
09. (IX) Control and Audit
-
-
-
-
-
10. (X) Costs and Benefits
-
-
-
-
-
Teaching Considerations
-
-
-
-
Module 4
-
-
-
-
-
01. (I) Underlying Problem
-
-
-
-
-
02. (II) Laws as Tools for Information Security
-
-
-
-
-
03. (III) Laws and Legislation as Legal Options to
-
-
-
-
-
Teaching Considerations
-
-
-
-
Module 5
-
-
-
-
-
01. (I) Overview
-
-
-
-
-
02. (II) System Sensitivity
-
-
-
-
-
03. (III) Security Requirements
-
-
-
-
-
04. (IV) Levels of Security
-
-
-
-
-
05. (V) Data Life Cycles
-
-
-
-
-
06. (VI) Sample Protection Plan
-
-
-
-
-
Teaching Considerations
-
-
-
-
Module 6
-
-
-
-
-
01. (I) Overview
-
-
-
-
-
02. (II) Threats
-
-
-
-
-
03. (III) Countermeasures
-
-
-
-
-
04. (IV) Tradeoffs-Costs & Benefits
-
-
-
-
-
05. (V) Network Design
-
-
-
-
-
Teaching Considerations
-
-
-
-
Module 7
-
-
-
-
-
01. (I) Overview
-
-
-
-
-
02. (II) Development of Security Program
-
-
-
-
-
03. (III) Risk Analysis
-
-
-
-
-
04. (IV) Contingency Planning
-
-
-
-
-
05. (V) Legal Issues for Managers
-
-
-
-
-
06. (VI) System Validation & Verification (Accredi
-
-
-
-
-
07. (VII) Information Systems Audit
-
-
-
-
-
08. (VIII) Computer Security Check List
-
-
-
-
-
Teaching Considerations
-
-
-
-
Module 8
-
-
-
Course Modules Website
-
-
-
Course Videos
-
-
-
IA Videos
-
-
-
-
Videos (Pg. 1)
-
-
-
-
Videos (Pg. 2)
-
-
-
-
Videos (Pg. 3)
-
-
-
-
Videos (Pg. 4)
-
-
-
-
Videos (Pg. 5)
-
-
-
-
Videos (Pg. 6)
-
-
-
-
Videos (Pg. 7)
-
External Links
-
-
Academic Sites
-
-
Government Sites
-
-
Independent Organizations
-
-
Industry Sites
-
General Interest
-
-
Common Criteria
-
-
IA Activities
-
-
Professional Certification
-
-
Seminal Works
-
-
-
Seminal Papers
-
Glossary
-
Publications
-
-
Government Documents
-
-
-
Gov Docs (Pg. 1)
-
-
-
Gov Docs (Pg. 2)
-
-
-
Gov Docs (Pg. 3)
-
-
-
Gov Docs (Pg. 4)
-
-
-
Gov Docs (Pg. 5)
-
-
-
Gov Docs (Pg. 6)
-
-
IA Posters
-
-
-
IA Posters (Pg. 1)
-
-
-
IA Posters (Pg. 2)
-
-
-
IA Posters (Pg. 3)
-
-
-
IA Posters (Pg. 4)
-
-
-
IA Posters (Pg. 5)
-
-
-
IA Posters (Pg. 6)
-
-
Industry Documents
-
-
NIATEC Publications
-
-
Older Papers
-
-
Publisher Databases
ForgotPassword
News
Rss Feeds
SiteMap